LandonPowell / Orwell Rat And Botnet
Licence: cc0-1.0
Orwell is a RAT and Botnet designed as a trio of programs by Landon Powell.
Stars: â 27
Projects that are alternatives of or similar to Orwell Rat And Botnet
Badusb botnet
đ„đ Infect a pc with badusb and establish a connection through telegram.
Stars: â 32 (+18.52%)
Mutual labels: infosec, botnet
PyIris
PyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.
Stars: â 296 (+996.3%)
Mutual labels: rat, infosec
Kratosknife
KratosKnife is a Advanced BOTNET Written in python 3 for Windows OS. Comes With Lot of Advanced Features such as Persistence & VM Detection Methods, Built-in Binder, etc
Stars: â 97 (+259.26%)
Mutual labels: rat, botnet
paradoxiaRAT
ParadoxiaRat : Native Windows Remote access Tool.
Stars: â 583 (+2059.26%)
Mutual labels: botnet, rat
Ghost
đ» RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware
Stars: â 312 (+1055.56%)
Mutual labels: rat, botnet
Teardroid-phprat
đźđł đ€ It's easy to use android botnet work without port forwarding, vps and android studio
Stars: â 417 (+1444.44%)
Mutual labels: botnet, rat
maalik
Feature-rich Post Exploitation Framework with Network Pivoting capabilities.
Stars: â 75 (+177.78%)
Mutual labels: rat, infosec
Javascript-Botnet-C-Sharp
This is a plugin for the c# R.A.T Server providing extension to javascript based browser botnets
Stars: â 22 (-18.52%)
Mutual labels: botnet, rat
Blacknet
Free advanced and modern Windows botnet with a nice and secure PHP panel.
Stars: â 271 (+903.7%)
Mutual labels: rat, botnet
Paradoxiarat
ParadoxiaRat : Native Windows Remote access Tool.
Stars: â 395 (+1362.96%)
Mutual labels: rat, botnet
Pupy
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python
Stars: â 6,737 (+24851.85%)
Mutual labels: rat
Dumpsterfire
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: â 775 (+2770.37%)
Mutual labels: infosec
Awesome Rat
RAT And C&C Resources. 250+ Open Source Projects, 1200+ RAT/C&C blog/video.
Stars: â 759 (+2711.11%)
Mutual labels: rat
Malware Samples
A collection of malware samples caught by several honeypots i manage
Stars: â 863 (+3096.3%)
Mutual labels: botnet
Venom
venom - shellcode generator/compiler/handler (metasploit)
Stars: â 904 (+3248.15%)
Mutual labels: rat
Chashell
Chashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.
Stars: â 742 (+2648.15%)
Mutual labels: infosec
Awesome Security Gists
A collection of various GitHub gists for hackers, pentesters and security researchers
Stars: â 701 (+2496.3%)
Mutual labels: infosec
Orwell - Cross Platform Botnet and RAT package.
Orwell is a RAT and Botnet designed as a trio of programs. The bigbro.py, which is ran on a remote server and used to give commands and information to proles; the innerPart.py, used to send commands to BB that are given to the proles; and prole.py, used as the zombie client. Prole.py currently supports Unix-Like OSes (MacOS and Linux) and Windows.
125QsXyFV5mWTGaJHZBzE6TDr4iMi2jSTp
Donate Bitcoin - A quick tutorial on the use of Orwell -
- Run
bigbro.py
on a server of your choice, and forward the port '1984'. - The
bigbro.py
file will ask for a password. Set and remember a secure one. - Change the
bigBro
variable on line 9 ofprole.py
tobigbro.py
's IP. - Compile
prole.py
for the OSes you're targeting using the resources below. - Run your compiled prole executable on zombie systems.
- Run the
innerParty.py
file on your home computer. Consider a proxy or Torify. - The
innerParty.py
file will ask you for BB's IP and for BB's password. - Congrats, you're now running a full Orwell botnet.
Orwell commands -
-
shell
- Run command line code on a prole. -
log
- Print a string to a prole's prompt. -
kill
- Shuts down a prole's system. -
~
,s
, orswitch
- Change who a command is sent to based upon an IP. -
?
,l
, orlisten
- Listen for emits for a given time, or even 'forever'.
TO COMPILE OR RUN, -
You need these -
This is the work of Landon Powell, and is licensed under Creative Commons Zero. A non-professional and not-applicable-in-a-court-of-law summary of the license is effectively: do whatever you want with this.
Note that the project description data, including the texts, logos, images, and/or trademarks,
for each open source project belongs to its rightful owner.
If you wish to add or remove any projects, please contact us at [email protected].